Enhancing Usability of Privileged Access Management (Pam) Systems: a Case Study of Implementation Strategies at the Commercial Bank of Ethiopia
No Thumbnail Available
Date
2024-08
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Addis Ababa University
Abstract
Privilege Access Management (PAM) systems play a critical role in modern cybersecurity, ensuring secure and controlled access to sensitive organizational resources. However, the usability of these systems can significantly impact their overall effectiveness and user adoption. The research problem addressed was the impact of factors on PAM system usability and the aim to address employees' reluctance to interact with PAM systems due to usability challenges. This study aims to evaluate the usability of a PAM system implemented within the Commercial Bank of Ethiopia (CBE), identify improvement areas, and inform future system design and deployment.
The research design methodology employed a mixed-methods approach, combining quantitative and qualitative data collection techniques. A total of 155 end-users, representing a diverse range of roles and levels of technical expertise, were recruited to participate in the study. Participants are provided feedback through questionnaires and interview questions on PAM usability. The study identified several factors that impacted the usability of the PAM system, including the intuitiveness of the workflow, and the level of integration with existing organizational processes. Based on these findings, the researchers developed a set of recommendations for enhancing the usability of the PAM system, such as simplifying the user support, improving the onboarding and training materials, and better aligning the system with the users' mental models and job responsibilities.
The results of this usability study provide valuable insights for both researchers and practitioners in the field of cybersecurity and PAM system design. The findings can inform the development of more user-centric PAM solutions and contribute to the broader understanding of the human factors that influence the adoption and effectiveness of critical security technologies within organizational settings.
Description
Keywords
PAM, UTAUT (Unified Theory of Acceptance and Use of Technology), Usability